OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61

Showing 26-50 of 61 citing articles:

Design of deep learning networks for nonlinear delay differential system for Stuxnet virus spread in an air gapped critical environment
Muhammad Junaid Ali Asif Raja, Zaheer Masood, Ijaz Hussain, et al.
Applied Soft Computing (2025), pp. 113091-113091
Closed Access

A comprehensive systematic review of intrusiondetection systems: emerging techniques,challenges, and future research directions
Arjun Kumar Bose Arnob, Rajarshi Roy Chowdhury, Nusrat Alam Chaiti, et al.
Journal of Edge Computing (2025)
Open Access

A Research Survey on Network Intrusion Detection for AIoT
Jian Luo, Kun Xiao, Geng Wang, et al.
Communications in computer and information science (2025), pp. 53-74
Closed Access

Review of Path Planning and Decision-Making in Automated Penetration Testing
Chao Zheng, Hui Lü, Peng Jin, et al.
Communications in computer and information science (2025), pp. 43-59
Closed Access

A Comparison of Neural-Network-Based Intrusion Detection against Signature-Based Detection in IoT Networks
Max Schrötter, Andreas Niemann, Bettina Schnor
Information (2024) Vol. 15, Iss. 3, pp. 164-164
Open Access | Times Cited: 3

A Comprehensive Analysis of the Machine Learning Algorithms in IoT IDS Systems
Erdal ÖZDOĞAN
IEEE Access (2024) Vol. 12, pp. 46785-46811
Open Access | Times Cited: 3

NLFlowLyzer: Toward generating an intrusion detection dataset and intruders behavior profiling through network layer traffic analysis and pattern extraction
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Computers & Security (2024), pp. 104160-104160
Closed Access | Times Cited: 3

Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey
Ulya Sabeel, Shahram Shah Heydari, Khalil El‐Khatib, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 1, pp. 1190-1212
Closed Access | Times Cited: 7

Designing the Network Intelligence Stratum for 6G networks
Paola Soto, Miguel Camelo, Ginés García-Aviles, et al.
Computer Networks (2024) Vol. 254, pp. 110780-110780
Closed Access | Times Cited: 2

An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks
Monika Roopak, Simon Parkinson, Gui Yun Tian, et al.
IET Networks (2024) Vol. 13, Iss. 5-6, pp. 513-527
Open Access | Times Cited: 2

Detection of Zero-Day Attacks in a Software-Defined LEO Constellation Network Using Enhanced Network Metric Predictions
Dennis Agnew, Ashlee Rice-Bladykas, Janise McNair
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6611-6634
Open Access | Times Cited: 2

Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs
S. P. Li, Omar Dib
Journal of theoretical and applied electronic commerce research (2024) Vol. 19, Iss. 4, pp. 2919-2960
Open Access | Times Cited: 2

MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss
Jiawei Zhang, Rui Chen, Yanchun Zhang, et al.
Knowledge-Based Systems (2023) Vol. 283, pp. 111110-111110
Closed Access | Times Cited: 6

The Mesa Security Model 2.0: A Dynamic Framework for Mitigating Stealth Data Exfiltration
Sanjeev Singh, Naveed Afzal
International Journal of Network Security & Its Applications (2024) Vol. 16, Iss. 3, pp. 23-40
Open Access | Times Cited: 1

SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture
Chao Zha, Zhiyu Wang, Yifei Fan, et al.
Computers & Security (2024) Vol. 146, pp. 104056-104056
Closed Access | Times Cited: 1

ASAP: Automatic Synthesis of Attack Prototypes, an online-learning, end-to-end approach
Jesús F. Cevallos M., Alessandra Rizzardi, Sabrina Sicari, et al.
Computer Networks (2024), pp. 110828-110828
Open Access | Times Cited: 1

Leveraging machine learning for enhanced cybersecurity: an intrusion detection system
Wurood Mahdi sahib, Zainab Ali Abd Alhuseen, Iman Dakhil Idan Saeedi, et al.
Service Oriented Computing and Applications (2024)
Closed Access | Times Cited: 1

Protecting Critical Infrastructure for Disasters: NLP-Based Automated Information Retrieval to Generate Hypothetical Cyberattack Scenarios
Christin Salley, Neda Mohammadi, John E. Taylor
Journal of Infrastructure Systems (2024) Vol. 30, Iss. 3
Closed Access | Times Cited: 1

Combining Uncensored and Censored LLMs for Ransomware Generation
Muhammad Mudassar Yamin, Ehtesham Hashmi, Basel Katt
Lecture notes in computer science (2024), pp. 189-202
Closed Access | Times Cited: 1

Trustworthy Artificial Intelligence Methods for Users’ Physical and Environmental Security: A Comprehensive Review
Sabina Szymoniak, Filip Depta, Łukasz Karbowiak, et al.
Applied Sciences (2023) Vol. 13, Iss. 21, pp. 12068-12068
Open Access | Times Cited: 2

The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems
Amadou Sara Camara
Вопросы безопасности (2024), Iss. 1, pp. 61-70
Open Access

Comparative Analysis of Classifiers for Cyber Attack Prediction on LUflow Dataset with Explainability
Geethika Gunti, Kuruva Divya Sree, Deepa Gupta
2022 IEEE 7th International conference for Convergence in Technology (I2CT) (2024)
Closed Access

Leveraging CNNs, Quantization, and Random Forest for Edge Deployable Intrusion Detection Efficiency
Anushika Kothari, Shreepad Joshi, Shreya Pai, et al.
(2024), pp. 1-7
Closed Access

Scroll to top